Add testsuite for pySim-shell with real cards

This patch adds a comprehensive testsuite for pySim-shell. The testsuite
is based on python's unittest framework in combination with pySim-shell
scripts.

Related: OS#6531
Change-Id: Ieae1330767a6e55e62437f5f988a0d33b727b5de
This commit is contained in:
Philipp Maier
2024-08-12 17:56:43 +02:00
parent d7032955c5
commit f87a00c04f
114 changed files with 22424 additions and 0 deletions

View File

View File

@@ -0,0 +1,34 @@
{
"gp_registry_related_data": [
{
"application_aid": "a000000151000000"
},
{
"life_cycle_state": "personalized"
},
{
"privileges": {
"security_domain": true,
"dap_verification": false,
"delegated_management": false,
"card_lock": false,
"card_terminate": false,
"card_reset": false,
"cvm_management": true,
"mandated_dap_verification": false,
"trusted_path": true,
"authorized_management": true,
"token_management": false,
"global_delete": true,
"global_lock": true,
"global_registry": true,
"final_application": false,
"global_service": false,
"receipt_generation": false,
"ciphered_load_file_data_block": false,
"contactless_activation": false,
"contactless_self_activation": false
}
}
]
}

View File

@@ -0,0 +1,136 @@
{
"key_information": [
{
"key_information_data": {
"key_identifier": 3,
"key_version_number": 50,
"key_types": [
{
"type": "aes",
"length": 32
}
]
}
},
{
"key_information_data": {
"key_identifier": 2,
"key_version_number": 50,
"key_types": [
{
"type": "aes",
"length": 32
}
]
}
},
{
"key_information_data": {
"key_identifier": 1,
"key_version_number": 50,
"key_types": [
{
"type": "aes",
"length": 32
}
]
}
},
{
"key_information_data": {
"key_identifier": 3,
"key_version_number": 42,
"key_types": [
{
"type": "aes",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 2,
"key_version_number": 42,
"key_types": [
{
"type": "aes",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 1,
"key_version_number": 42,
"key_types": [
{
"type": "aes",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 2,
"key_version_number": 64,
"key_types": [
{
"type": "des",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 1,
"key_version_number": 64,
"key_types": [
{
"type": "tls_psk",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 3,
"key_version_number": 1,
"key_types": [
{
"type": "aes",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 2,
"key_version_number": 1,
"key_types": [
{
"type": "aes",
"length": 16
}
]
}
},
{
"key_information_data": {
"key_identifier": 1,
"key_version_number": 1,
"key_types": [
{
"type": "aes",
"length": 16
}
]
}
}
]
}

View File

@@ -0,0 +1,76 @@
# Testsuite for pySim-shell.py
#
# (C) 2024 by sysmocom - s.f.m.c. GmbH
# All Rights Reserved
#
# Author: Philipp Maier
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import unittest
import os
from utils import *
class test_case(UnittestUtils):
def test_est_scp02_direct(self):
cardnames = ['sysmoISIM-SJA5-S17', 'sysmoISIM-SJA2']
for cardname in cardnames:
key_dek = self.cards[cardname]['SCP02_DEK_1'] #kik1
key_enc = self.cards[cardname]['SCP02_ENC_1'] #kic1
key_mac = self.cards[cardname]['SCP02_MAC_1'] #kid1
self.equipTemplate("test_est_scp02_direct.script",
KEY_DEK = key_dek, KEY_ENC = key_enc, KEY_MAC = key_mac)
self.runPySimShell(cardname, "test_est_scp02_direct.script", no_exceptions = True)
def test_est_scp02_csv(self):
cardnames = ['sysmoISIM-SJA5-S17', 'sysmoISIM-SJA2']
for cardname in cardnames:
self.runPySimShell(cardname, "test_est_scp02_csv.script", no_exceptions = True, add_csv = True)
def test_est_scp03_direct(self):
cardname = 'sysmoEUICC1-C2T'
key_dek = self.cards[cardname]['SCP03_DEK_1'] #kik1
key_enc = self.cards[cardname]['SCP03_ENC_1'] #kic1
key_mac = self.cards[cardname]['SCP03_MAC_1'] #kid1
self.equipTemplate("test_est_scp03_direct.script",
KEY_DEK = key_dek, KEY_ENC = key_enc, KEY_MAC = key_mac)
self.runPySimShell(cardname, "test_est_scp03_direct.script", no_exceptions = True)
def test_est_scp03_csv(self):
cardname = 'sysmoEUICC1-C2T'
self.runPySimShell(cardname, "test_est_scp03_csv.script", no_exceptions = True, add_csv = True)
def test_put_delete_key(self):
# TODO: It might be helpful to run this test on an sysmoISIM-SJA5-S17 uicc as well, but unfortunately those
# cards do not have enough memory for another keyset. We would have to resize the space for the key storage
# first, or we would have to delete one keyset first. Both options are not very attractive.
cardname = 'sysmoEUICC1-C2T'
self.runPySimShell(cardname, "test_put_delete_key.script", no_exceptions = True, add_csv = True)
self.assertEqualFiles("key_information.tmp",
ignore_regex_list = ['.*'],
interesting_regex_list = ['.*42.*'])
def test_get_status(self):
cardname = 'sysmoEUICC1-C2T'
self.runPySimShell(cardname, "test_get_status.script", no_exceptions = True, add_csv = True)
self.assertEqualFiles("get_status_isd.tmp")
if __name__ == "__main__":
unittest.main()

View File

@@ -0,0 +1,7 @@
set debug true
set echo true
select ADF.ISD
establish_scp02 --key-provider-suffix 1 --key-ver 112 --security-level 3
get_data issuer_identification_number
release_scp

View File

@@ -0,0 +1,8 @@
set debug true
set echo true
select ADF.ISD
establish_scp02 --key-dek $KEY_DEK --key-enc $KEY_ENC --key-mac $KEY_MAC --key-ver 112 --security-level 3
get_data issuer_identification_number
release_scp

View File

@@ -0,0 +1,7 @@
set debug true
set echo true
select ADF.ISD-R
establish_scp03 --key-provider-suffix 1 --key-ver 50 --security-level 3
get_data issuer_identification_number
release_scp

View File

@@ -0,0 +1,7 @@
set debug true
set echo true
select ADF.ISD-R
establish_scp03 --key-dek $KEY_DEK --key-enc $KEY_ENC --key-mac $KEY_MAC --key-ver 50 --security-level 3
get_data issuer_identification_number
release_scp

View File

@@ -0,0 +1,9 @@
set debug true
set echo true
select ADF.ISD-R
establish_scp03 --key-provider-suffix 1 --key-ver 50 --security-level 3
get_status isd > get_status_isd.tmp
release_scp

View File

@@ -0,0 +1,20 @@
set debug true
set echo true
# Establish secure channel
select ADF.ISD-R
establish_scp03 --key-provider-suffix 1 --key-ver 50 --security-level 3
# Put a keyset
put_key --key-version-nr 42 --key-id 1 --key-type aes --key-data 11111111111111111111111111111111 --key-type aes --key-data 22222222222222222222222222222222 --key-type aes --key-data 33333333333333333333333333333333
# Read key information to see if the keyset was actually stored
get_data key_information > key_information.tmp
# Delete the keyset again
delete_key --key-id 1 --key-ver 42
delete_key --key-id 2 --key-ver 42
delete_key --key-id 3 --key-ver 42
# Release secure channel
release_scp